Users with only access to launch VDA applications can launch an unauthorized desktop
Max CVSS
6.3
EPSS Score
0.05%
Published
2023-07-10
Updated
2023-07-18

CVE-2023-24489

Known exploited
A vulnerability has been discovered in the customer-managed ShareFile storage zones controller which, if exploited, could allow an unauthenticated attacker to remotely compromise the customer-managed ShareFile storage zones controller.
Max CVSS
9.8
EPSS Score
97.43%
Published
2023-07-10
Updated
2023-07-18
CISA KEV Added
2023-08-16
A vulnerability has been identified in Citrix Workspace app for Linux that, if exploited, may result in a malicious local user being able to gain access to the Citrix Virtual Apps and Desktops session of another user who is using the same computer from which the ICA session is launched.
Max CVSS
5.5
EPSS Score
0.04%
Published
2023-07-10
Updated
2023-07-18
Vulnerabilities have been identified that, collectively, allow a standard Windows user to perform operations as SYSTEM on the computer running Citrix Workspace app.
Max CVSS
7.8
EPSS Score
0.04%
Published
2023-02-16
Updated
2023-02-24
A malicious user can cause log files to be written to a directory that they do not have permission to write to.
Max CVSS
5.5
EPSS Score
0.04%
Published
2023-02-16
Updated
2023-02-24
Corruption of the system by a remote, unauthenticated user. The impact of this can include the reset of the administrator password at the next device reboot, allowing an attacker with ssh access to connect with the default administrator credentials after the device has rebooted.
Max CVSS
8.1
EPSS Score
0.29%
Published
2022-06-16
Updated
2023-07-18
Unauthorized access to Gateway user capabilities
Max CVSS
9.8
EPSS Score
0.14%
Published
2022-11-08
Updated
2023-10-18
An Improper Access Control vulnerability exists in Citrix Workspace App for Linux 2012 - 2111 with App Protection installed that can allow an attacker to perform local privilege escalation.
Max CVSS
7.8
EPSS Score
0.04%
Published
2022-02-09
Updated
2023-06-27

CVE-2021-22941

Known exploited
Used for ransomware
Improper Access Control in Citrix ShareFile storage zones controller before 5.11.20 may allow an unauthenticated attacker to remotely compromise the storage zones controller.
Max CVSS
10.0
EPSS Score
1.53%
Published
2021-09-23
Updated
2022-08-30
CISA KEV Added
2022-03-25
A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to a phishing attack through a SAML authentication hijack to steal a valid user session.
Max CVSS
6.5
EPSS Score
0.16%
Published
2021-08-05
Updated
2021-08-13
An improper access control vulnerability exists in Citrix Workspace App for Windows potentially allows privilege escalation in CR versions prior to 2105 and 1912 LTSR prior to CU4.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-05-27
Updated
2022-08-30
Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible.
Max CVSS
6.5
EPSS Score
0.08%
Published
2021-06-16
Updated
2022-09-20
Citrix Secure Mail for Android before 20.11.0 suffers from improper access control allowing unauthenticated access to read limited calendar related data stored within Secure Mail. Note that a malicious app would need to be installed on the Android device or a threat actor would need to execute arbitrary code on the Android device.
Max CVSS
4.3
EPSS Score
0.09%
Published
2021-01-06
Updated
2021-01-12
Authentication Bypass resulting in exposure of SD-WAN functionality in Citrix SD-WAN Center versions before 11.2.2, 11.1.2b and 10.2.8
Max CVSS
7.5
EPSS Score
0.08%
Published
2020-11-16
Updated
2020-11-30
Improper authentication in Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6 and Citrix XenMobile Server before 10.9 RP5 leads to the ability to access sensitive files.
Max CVSS
7.5
EPSS Score
0.17%
Published
2020-09-18
Updated
2020-10-01
Improper access control in Citrix Workspace app for Windows 1912 CU1 and 2006.1 causes privilege escalation and code execution when the automatic updater service is running.
Max CVSS
8.8
EPSS Score
0.09%
Published
2020-07-24
Updated
2020-07-29
Improper authentication in Citrix StoreFront Server < 1912.0.1000 allows an attacker who is authenticated on the same Microsoft Active Directory domain as a Citrix StoreFront server to read arbitrary files from that server.
Max CVSS
6.5
EPSS Score
0.07%
Published
2020-09-18
Updated
2020-10-07

CVE-2020-8196

Known exploited
Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users.
Max CVSS
4.3
EPSS Score
0.26%
Published
2020-07-10
Updated
2022-09-20
CISA KEV Added
2021-11-03

CVE-2020-8193

Known exploited
Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows unauthenticated access to certain URL endpoints.
Max CVSS
6.5
EPSS Score
97.46%
Published
2020-07-10
Updated
2022-09-20
CISA KEV Added
2021-11-03
Citrix ShareFile before 19.23 allows a downgrade from two-factor authentication to one-factor authentication. An attacker with access to the offline victim's otp physical token or virtual app (like google authenticator) is able to bypass the first authentication phase (username/password mechanism) and log-in using username/otp combination only (phase 2 of 2FA).
Max CVSS
5.9
EPSS Score
0.10%
Published
2019-05-13
Updated
2019-07-09
An Incorrect Access Control vulnerability has been identified in Citrix XenMobile Server 10.8.0 before Rolling Patch 6 and 10.9.0 before Rolling Patch 3. An attacker can impersonate and take actions on behalf of any Mobile Application Management (MAM) enrolled device.
Max CVSS
9.1
EPSS Score
0.12%
Published
2019-06-05
Updated
2019-09-11
* Lack of authentication in Citrix Xen Mobile through 10.8 allows low-privileged local users to execute system commands as root by making requests to private services listening on ports 8000, 30000 and 30001. NOTE: the vendor disputes that this is a vulnerability, stating it is "already mitigated by the internal firewall that limits access to configuration services to localhost.
Max CVSS
7.8
EPSS Score
0.04%
Published
2018-10-24
Updated
2024-04-11
Command injection vulnerability in Citrix NetScaler ADC and NetScaler Gateway 11.0 before build 70.16, 11.1 before build 55.13, and 12.0 before build 53.13; and the NetScaler Load Balancing instance distributed with NetScaler SD-WAN/CloudBridge 4000, 4100, 5000 and 5100 WAN Optimization Edition 9.3.0 allows remote attackers to execute a system command or read arbitrary files via an SSH login prompt.
Max CVSS
7.5
EPSS Score
0.12%
Published
2018-03-01
Updated
2019-10-03
A vulnerability has been identified in the management interface of Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.1 before build 135.18, 10.5 before build 66.9, 10.5e before build 60.7010.e, 11.0 before build 70.16, 11.1 before build 55.13, and 12.0 before build 53.13 (except for build 41.24) that, if exploited, could allow an attacker with access to the NetScaler management interface to gain administrative access to the appliance.
Max CVSS
9.0
EPSS Score
0.22%
Published
2017-09-26
Updated
2019-10-03
Incorrect access control mechanisms in Citrix Receiver Desktop Lock 4.5 allow an attacker to bypass the authentication requirement by leveraging physical access to a VDI for temporary disconnection of a LAN cable. NOTE: as of 20161208, the vendor could not reproduce the issue, stating "the researcher was unable to provide us with information that would allow us to confirm the behaviour and, despite extensive investigation on test deployments of supported products, we were unable to reproduce the behaviour as he described. The researcher has also, despite additional requests for information, ceased to respond to us."
Max CVSS
6.8
EPSS Score
0.42%
Published
2016-11-07
Updated
2017-09-06
33 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!